Про це на брифінгу у Вашингтоні повідомив радник американського президента із національної безпеки Джейк Салліван
…
Western military experts are assessing whether an autonomous drone operated by artificial intelligence, or AI, killed people — in Libya last year — for the first time without a human controller directing it remotely to do so.
A report by a United Nations panel of experts issued last week that concluded an advanced drone deployed in Libya “hunted down and remotely engaged” soldiers fighting for Libyan general Khalifa Haftar has prompted a frenetic debate among Western security officials and analysts.
Governments at the United Nations have been debating for months whether a global pact should be agreed on the use of armed drones, autonomous and otherwise, and what restrictions should be placed on them. The U.N.’s Libya report is adding urgency to the debate. Drone advances have “a lot of implications regionally and globally,” says Ziya Meral of the Britain’s Royal United Services Institute, a defense think tank.
“It is time to assess where things are with Turkish drones and advanced warfare technology and what this means for the region and what it means for NATO,” he said at a RUSI-hosted event in London.
According to the U.N. report, Turkish-made Kargu-2 lethal autonomous aircraft launched so-called swarm attacks, likely on behalf of Libya’s Government of National Accord, against the warlord Haftar’s militias in March last year, marking the first time AI-equipped drones accomplished a successful attack. Remnants of a Kargu-2 were recovered later.
The use of autonomous drones that do not require human operators to guide them remotely once they have been programmed is opposed by many human rights organizations. There were rumors that Turkish-supplied AI drones, alongside remote-guided ones, were used last year by Azerbaijani forces in their clashes with Armenia in the disputed region of Nagorno-Karabakh and its surrounding territories.
Myriad of dilemmas
If AI drones did launch lethal swarm attacks it would mark a “new chapter in autonomous weapons,” worries the Bulletin of the Atomic Scientists. Critics of AI drones, which can use facial-recognition technology, say they raise a number of moral, ethical and legal dilemmas.
“These types of weapons operate on software-based algorithms ‘taught’ through large training datasets to, for example, classify various objects. Computer vision programs can be trained to identify school buses, tractors, and tanks. But the datasets they train on may not be sufficiently complex or robust, and an artificial intelligence (AI) may ‘learn’ the wrong lesson,” the non-profit Bulletin warns.
The manufacturer of the Kargu-2, Defense Technologies and Trade (STM), told Turkish media last year that their drones are equipped with facial-recognition technology, allowing individual targets to be identified and neutralized without having to deploy ground forces. And company executives say Kargu-2 drones can swarm together overwhelming defenses.
Last month, Turkish President Recep Tayyip Erdogan lauded the success of Turkish unmanned aerial vehicles (UAV), saying the results they had produced “require war strategies to be rewritten.” Turkey has deployed them in military operations in northern Syria, Turkish officials have acknowledged.
Speaking at a parliamentary meeting of his ruling Justice and Development Party (AKP) in Ankara, Erdogan said Turkey plans to go further and is aiming to be among the first countries to develop an AI-managed warplane. Recently the chief technology officer of Baykar, a major Turkish drone manufacturer, announced the company had slated 2023 for the maiden flight of its prototype unmanned fighter jet.
‘A significant player’
Sanctions and embargoes on Turkey in recent years have been a major driving force behind Ankara pressing ahead to develop a new generation of unconventional weapons, says Ulrike Franke of the European Council for Foreign Relations. “Turkey has become a significant player in the global drone market,” she said at the RUSI event. When it comes to armed drones, she noted, there are four states dominating drone development — the U.S., Israel, China and Turkey. The latter pair, the “new kids on the block,” are driving drone proliferation because unlike the U.S. they are not reticent about export sales, she said.
“Turkey has shown that a mid-sized power, when it puts its mind and money behind it, can develop very sophisticated armed drones,” says Franke.
Last October when the disputed enclave of Nagorno-Karabakh saw the worst fighting there since 1994, Turkish drones were assessed as having given Azerbaijan a key edge over the Armenians. Turkish drones sliced through Armenia’s air defenses and pummeled its Russian-made tanks.
Analysts calculate around 90 countries have military drones for reconnaissance and intelligence missions and at least a dozen states have armed drones. Britain is believed to have ten; Turkey around 140. The U.S. air force has around 300 Reaper drones alone. The deployment of armed drones to conduct targeted killings outside formal war zones has been highly contentious. But AI drone development is adding to global alarm.
“With more and more countries acquiring armed drones, there is a risk that the controversies surrounding how drones are used and the challenges these pose to international legal frameworks, as well as to democratic values such as transparency, accountability and the rule of law, could also increase,” Britain’s Chatham House noted in a research paper published in April.
“This is accentuated further, given that the use of drones continues to expand and to evolve in new ways, and in the absence of a distinct legal framework to regulate such use,” say the paper’s authors Jessica Dorsey and Nilza Amaral.
…
A slew of crypto-related accounts in China’s Twitter-like Weibo platform were blocked over the weekend, as Beijing stepped up a crackdown on bitcoin trading and mining. More actions are expected, including linking illegal crypto activities in China more directly with the country’s criminal law, according to analysts and a financial regulator. Last month, China’s State Council, or cabinet, vowed to crack down on bitcoin mining and trading, escalating a campaign against cryptocurrencies days after three industry bodies banned crypto-related financial and payment services. Over the weekend, access to several of widely followed crypto-related Weibo accounts was denied, with a message saying each account “violates laws and rules.” “It’s a Judgment Day for crypto KOL,” wrote a Weibo bitcoin commentator, or key opinion leader (KOL), who calls herself “Woman Dr. bitcoin mini.” Her main account was also blocked on Saturday. “The government makes it clear that no Chinese version of Elon Musk can exist in the Chinese crypto market,” said NYU Law School adjunct professor Winston Ma, referring to the Tesla founder and cryptocurrency enthusiast. Ma, author of the book “The Digital War,” also expects China’s supreme court to publish a judicial interpretation soon that may link crypto mining and trading businesses with China’s body of criminal law. The view was echoed by a financial regulator, who said that such an interpretation would address the legal ambiguity that has failed to clearly identify bitcoin trading businesses as “illegal operations.” All the rules against cryptocurrencies so far in China have been published by administrative bodies. The Weibo freeze comes as Chinese media have stepped up reporting against crypto trading. The official Xinhua News Agency has published articles that exposed a series of crypto-related scams. State broadcaster CCTV has said cryptocurrency is a lightly regulated asset often used in black market trade, money laundering, arms smuggling, gambling and drug dealings. The stepped-up crackdown also comes as China’s central bank is accelerating testing of its own digital currency.
…
Microsoft Corp. blamed “accidental human error” for its Bing search engine briefly not showing image results for the search term “tank man” on the anniversary of the bloody military crackdown in Beijing’s Tiananmen Square in 1989.Users in different parts of the world, including the U.S., said Friday that no image results were returned when they searched for the term “tank man.””Tank man” refers to the iconic image of a standoff between an unidentified civilian and a line of military tanks leaving Beijing’s Tiananmen Square after a brutal crackdown on pro-democracy protesters. The photo has become a symbol of defiance around the world.After being alerted by reporters, Microsoft said in a statement that the issue was “due to an accidental human error and has been resolved.” Hours later, images of “tank man” photographs were returned by the search engine.The company did not elaborate on what the human error was or how it had happened. Nor did it say how much of its Bing development team is China-based. The company’s largest research and development center outside the United States is in China, and it posted a job in January for a China-based senior software engineer to lead a team that develops the technology powering Bing image search.Chinese authorities require search engines, websites and social media platforms operating within the country to censor keywords and results deemed politically sensitive or critical of the Chinese government.References to the Tiananmen Square crackdown in 1989 are blocked in China, as are images relating to the event, such as “tank man.”Microsoft’s Bing is one of the few international search engines that operate in China, where it abides by local censorship laws and competes with larger Chinese search engines such as Baidu and Sogou.Bing has a 2.5% market share in China, according to data site Statcounter.Rival Google exited the Chinese market in 2010 after four years of operation, following disputes over censorship and a major hacking attack that Google believes originated in China.
…
Foreign keyboard criminals with scant fear of repercussions have paralyzed U.S. schools and hospitals, leaked highly sensitive police files, triggered fuel shortages and, most recently, threatened global food supply chains.Escalating havoc caused by ransomware gangs raises an obvious question: Why has the United States, believed to have the world’s greatest cyber capabilities, looked so powerless to protect its citizens from these kind of criminals operating with near impunity out of Russia and allied countries?The answer is that there are numerous technological, legal and diplomatic hurdles to going after ransomware gangs. Until recently, it just hasn’t been a high priority for the U.S. government.That has changed as the problem has grown well beyond an economic nuisance. President Joe Biden intends to confront Russia’s leader, Vladimir Putin, about Moscow’s harboring of ransomware criminals when the two men meet in Europe later this month. The Biden administration has also promised to boost defenses against attacks, improve efforts to prosecute those responsible and build diplomatic alliances to pressure countries that harbor ransomware gangs.Calls are growing for the administration to direct U.S. intelligence agencies and the military to attack ransomware gangs’ technical infrastructure used for hacking, posting sensitive victim data on the dark web and storing digital currency payouts.Fighting ransomware requires the nonlethal equivalent of the “global war on terrorism” launched after the Sept. 11 attacks, said John Riggi, a former FBI agent and senior adviser for cybersecurity and risk for the America Hospital Association. Its members have been hard hit by ransomware gangs during the coronavirus pandemic.”It should include a combination of diplomatic, financial, law enforcement, intelligence operations, of course, and military operations,” Riggi said.A public-private task force including Microsoft and Amazon made similar suggestions in an 81-page report that called for intelligence agencies and the Pentagon’s U.S. Cyber Command to work with other agencies to “prioritize ransomware disruption operations.””Take their infrastructure away, go after their wallets, their ability to cash out,” said Philip Reiner, a lead author of the report. He worked at the National Security Council during the Obama presidency and is now CEO at The Institute for Security and Technology.A JBS Processing Plant stands dormant after halting operations on June 1, 2021, in Greeley, Colorado. JBS facilities around the globe were impacted by a ransomware attack, forcing many of its facilities to shut down.But the difficulties of taking down ransomware gangs and other cybercriminals have long been clear. The FBI’s list of most-wanted cyber fugitives has grown at a rapid clip and now has more than 100 entries, many of whom are not exactly hiding. Evgeniy Bogachev, indicted nearly a decade ago for what prosecutors say was a wave of cyber bank thefts, lives in a Russian resort town and “is known to enjoy boating” on the Black Sea, according to the FBI’s wanted listing.Ransomware gangs can move around, do not need much infrastructure to operate and can shield their identities. They also operate in a decentralized network. For instance, DarkSide, the group responsible for the Colonial Pipeline attack that led to fuel shortages in the South, rents out its ransomware software to partners to carry out attacks.Katie Nickels, director of intelligence at the cybersecurity firm Red Canary, said identifying and disrupting ransomware criminals takes time and serious effort.”A lot of people misunderstand that the government can’t just willy-nilly go out and press a button and say, well, nuke that computer,” she said. “Trying to attribute to a person in cyberspace is not an easy task, even for intelligence communities.”Reiner said those limits do not mean the United States cannot still make progress against defeating ransomware, comparing it with America’s ability to degrade the terrorist group al-Qaida while not capturing its leader, Ayman al-Zawahiri, who took over after U.S. troops killed Osama bin Laden.”We can fairly easily make the argument that al-Qaida no longer poses a threat to the homeland,” Reiner said. “So, short of getting al-Zawahiri, you destroy his ability to actually operate. That’s what you can do to these [ransomware] guys.”The White House has been vague about whether it plans to use offensive cyber measures against ransomware gangs. Press secretary Jen Psaki said Wednesday that “we’re not going to take options off the table,” but she did not elaborate. Her comments followed a ransomware attack by a Russian gang that caused outages at Brazil’s JBS SA, the second-largest producer of beef, pork and chicken in the United States.FILE – Tanker trucks are parked near the entrance of Colonial Pipeline Company, May 12, 2021, in Charlotte, N.C. The operator of the nation’s largest fuel pipeline paid $4.4 million to a gang of hackers who broke into its computer systems.Gen. Paul Nakasone, who leads U.S. Cyber Command and the National Security Agency, said at a recent symposium that he believes the U.S. will be “bringing the weight of our nation,” including the Defense Department, “to take down this [ransomware] infrastructure outside the United States.”Sen. Angus King, an independent from Maine who is a legislative leader on cybersecurity issues, said the debate in Congress over how aggressive the U.S. needs to be against ransomware gangs, as well as state adversaries, will be “front and center of the next month or two.””To be honest, it’s complicated because you’re talking about using government agencies, government capabilities to go after private citizens in another country,” he said.The U.S. is widely believed to have the best offensive cyber capabilities in the world, though details about such highly classified activities are scant. Documents leaked by former NSA contractor Edward Snowden show the U.S. conducted 231 offensive cyber operations in 2011. More than a decade ago a virus called Stuxnet attacked control units for centrifuges in an underground site in Iran, causing the sensitive devices to spin out of control and destroy themselves. The cyberattack was attributed to America and Israel.U.S. policy called “persistent engagement” already authorizes cyberwarriors to engage hostile hackers in cyberspace and disrupt their operations with code. U.S. Cyber Command has launched offensive operations related to election security, including against Russian misinformation officials during U.S. midterm elections in 2018.After the Colonial Pipeline attack, Biden promised that his administration was committed to bringing foreign cybercriminals to justice. Yet even as he was speaking from the White House, a different Russian-linked ransomware gang was leaking thousands of highly sensitive internal files — including deeply personal background checks — belonging to the police department in the nation’s capital. Experts believe it’s the worst ransomware attack against a U.S.-based law enforcement agency.”We are not afraid of anyone,” the hackers wrote in a follow-up post.
…
Millions of Nigerians struggled Saturday to access Twitter, a day after authorities suspended the service in response to the company’s deletion of a tweet by President Muhammadu Buhari for violating its terms of service.The Twitter ban took effect Saturday morning. Millions of users in Lagos and Abuja said they were unable to access their accounts.Authorities said Friday that they had banned Twitter because it was persistently being used “for activities that are capable of undermining Nigeria’s corporate existence.”Twitter responded to the ban, saying it was “deeply concerning.”‘Reverse the unlawful suspension’Many citizens and rights groups objected to the ban. Amnesty International said it was a threat to free speech and must be reversed without delay. “Amnesty International condemns the Nigerian government’s suspension of Twitter in Nigeria,” said Seun Bakare, a spokesperson for the organization. Bakare said Amnesty had called on Nigerian authorities “to immediately reverse the unlawful suspension and other plans to gag the media, to repress the civic space and to undermine human rights of the people. The Nigerian government has an obligation to protect and promote International human rights laws and standards.”FILE – Nigerian President Muhammadu Buhari attends a press briefing in Pretoria, South Africa, Oct. 3, 2019.The ban mostly affected the country’s largest network providers, MTN and Airtel.Some users Saturday were able to access Twitter using Wi-Fi connections. Others were avoiding the shutdown by using virtual private networks that make them appear to be using Twitter from another country.VPN providers have since Friday seen a surge in usage. Abuja resident Basil Akpakavir was among Twitter users getting around the government ban.”They are relentless in their intolerant attitude toward people that have contrary opinion to theirs,” Akpakavir said. “But the truth is that we’re equal to the task, as well. Whichever way they want it, we’re going to give it to them. We want a Nigeria that is prosperous, that is built on the tenets of true democracy.”Separatist group singled outBuhari had threatened earlier in the week to crack down on separatist group Indigenous People of Biafra (IPOB), in a manner similar to the civil war waged in 1967 when 3 million Biafrans were estimated to have died in battle against the Nigerian government.The president’s tweet was criticized as a war threat to separatist groups, and Twitter deleted it.Amnesty’s Bakare said the government must be held accountable for comments capable of instigating division and violence.”It is important that government platforms, and in this particular instance the president, do not invite violence or division,” Bakare said. “The government must be alive to the increased tensions in the country, given the spate of insecurity.”The Nigerian government has often attempted to regulate the use of social media to reduce criticism.Late last year, the government proposed a social media regulation bill after the End SARS protests against police brutality, when social media were used by young Nigerians to mobilize and challenge what they said was bad governance.
…